<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_enumeration_smb_user</id>
	<title>Nmap: enumeration smb user - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_enumeration_smb_user"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_enumeration_smb_user&amp;action=history"/>
	<updated>2026-04-20T09:11:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_enumeration_smb_user&amp;diff=45642&amp;oldid=prev</id>
		<title>Onnowpurbo: New page: Sumber: https://nmap.org/nsedoc/scripts/smb-enum-users.html    ==File smb-enum-users==   Script types: hostrule  Categories: auth, intrusive  Download: http://nmap.org/svn/scripts/smb-enum...</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_enumeration_smb_user&amp;diff=45642&amp;oldid=prev"/>
		<updated>2016-02-14T13:44:25Z</updated>

		<summary type="html">&lt;p&gt;New page: Sumber: https://nmap.org/nsedoc/scripts/smb-enum-users.html    ==File smb-enum-users==   Script types: hostrule  Categories: auth, intrusive  Download: http://nmap.org/svn/scripts/smb-enum...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://nmap.org/nsedoc/scripts/smb-enum-users.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==File smb-enum-users==&lt;br /&gt;
&lt;br /&gt;
 Script types: hostrule&lt;br /&gt;
 Categories: auth, intrusive&lt;br /&gt;
 Download: http://nmap.org/svn/scripts/smb-enum-users.nse&lt;br /&gt;
&lt;br /&gt;
==User Summary==&lt;br /&gt;
&lt;br /&gt;
Attempts to enumerate the users on a remote Windows system, with as much information as possible, through two different techniques (both over MSRPC, which uses port 445 or 139; see smb.lua). The goal of this script is to discover all user accounts that exist on a remote system. This can be helpful for administration, by seeing who has an account on a server, or for penetration testing or network footprinting, by determining which accounts exist on a system.&lt;br /&gt;
&lt;br /&gt;
A penetration tester who is examining servers may wish to determine the purpose of a server. By getting a list of who has access to it, the tester might get a better idea (if financial people have accounts, it probably relates to financial information). Additionally, knowing which accounts exist on a system (or on multiple systems) allows the pen-tester to build a dictionary of possible usernames for bruteforces, such as a SMB bruteforce or a Telnet bruteforce. These accounts may be helpful for other purposes, such as using the accounts in Web applications on this or other servers.&lt;br /&gt;
&lt;br /&gt;
From a pen-testers perspective, retrieving the list of users on any given server creates endless possibilities.&lt;br /&gt;
&lt;br /&gt;
Users are enumerated in two different ways: using SAMR enumeration or LSA bruteforcing. By default, both are used, but they have specific advantages and disadvantages. Using both is a great default, but in certain circumstances it may be best to give preference to one.&lt;br /&gt;
&lt;br /&gt;
Advantages of using SAMR enumeration:&lt;br /&gt;
&lt;br /&gt;
    Stealthier (requires one packet/user account, whereas LSA uses at least 10 packets while SAMR uses half that; additionally, LSA makes a lot of noise in the Windows event log (LSA enumeration is the only script I (Ron Bowes) have been called on by the administrator of a box I was testing against).&lt;br /&gt;
    More information is returned (more than just the username).&lt;br /&gt;
    Every account will be found, since they&amp;#039;re being enumerated with a function that&amp;#039;s designed to enumerate users.&lt;br /&gt;
&lt;br /&gt;
Advantages of using LSA bruteforcing:&lt;br /&gt;
&lt;br /&gt;
    More accounts are returned (system accounts, groups, and aliases are returned, not just users).&lt;br /&gt;
    Requires a lower-level account to run on Windows XP and higher (a &amp;#039;guest&amp;#039; account can be used, whereas SAMR enumeration requires a &amp;#039;user&amp;#039; account; especially useful when only guest access is allowed, or when an account has a blank password (which effectively gives it guest access)).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Example Usage==&lt;br /&gt;
&lt;br /&gt;
 nmap --script smb-enum-users.nse -p445 &amp;lt;host&amp;gt;&lt;br /&gt;
 sudo nmap -sU -sS --script smb-enum-users.nse -p U:137,T:139 &amp;lt;host&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Script Output==&lt;br /&gt;
&lt;br /&gt;
 Host script results:&lt;br /&gt;
 |  smb-enum-users:&lt;br /&gt;
 |_ |_ Domain: RON-WIN2K-TEST; Users: Administrator, Guest, IUSR_RON-WIN2K-TEST, IWAM_RON-WIN2K-TEST, test1234, TsInternetUser&lt;br /&gt;
&lt;br /&gt;
 Host script results:&lt;br /&gt;
 |  smb-enum-users:&lt;br /&gt;
 |  |  RON-WIN2K-TEST\Administrator (RID: 500)&lt;br /&gt;
 |  |  |  Description: Built-in account for administering the computer/domain&lt;br /&gt;
 |  |  |_ Flags:       Password does not expire, Normal user account&lt;br /&gt;
 |  |  RON-WIN2K-TEST\Guest (RID: 501)&lt;br /&gt;
 |  |  |  Description: Built-in account for guest access to the computer/domain&lt;br /&gt;
 |  |  |_ Flags:       Password not required, Password does not expire, Normal user account&lt;br /&gt;
 |  |  RON-WIN2K-TEST\IUSR_RON-WIN2K-TEST (RID: 1001)&lt;br /&gt;
 |  |  |  Full name:   Internet Guest Account&lt;br /&gt;
 |  |  |  Description: Built-in account for anonymous access to Internet Information Services&lt;br /&gt;
 |  |  |_ Flags:       Password not required, Password does not expire, Normal user account&lt;br /&gt;
 |  |  RON-WIN2K-TEST\IWAM_RON-WIN2K-TEST (RID: 1002)&lt;br /&gt;
 |  |  |  Full name:   Launch IIS Process Account&lt;br /&gt;
 |  |  |  Description: Built-in account for Internet Information Services to start out of process applications&lt;br /&gt;
 |  |  |_ Flags:       Password not required, Password does not expire, Normal user account&lt;br /&gt;
 |  |  RON-WIN2K-TEST\test1234 (RID: 1005)&lt;br /&gt;
 |  |  |_ Flags:       Normal user account&lt;br /&gt;
 |  |  RON-WIN2K-TEST\TsInternetUser (RID: 1000)&lt;br /&gt;
 |  |  |  Full name:   TsInternetUser&lt;br /&gt;
 |  |  |  Description: This user account is used by Terminal Services.&lt;br /&gt;
 |_ |_ |_ Flags:       Password not required, Password does not expire, Normal user account &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Contoh lain&lt;br /&gt;
&lt;br /&gt;
 Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2016-02-14 20:40 WIB&lt;br /&gt;
 Stats: 0:00:02 elapsed; 0 hosts completed (0 up), 1 undergoing ARP Ping Scan&lt;br /&gt;
 Parallel DNS resolution of 1 host. Timing: About 0.00% done&lt;br /&gt;
 Nmap scan report for 192.168.0.80&lt;br /&gt;
 Host is up (0.0018s latency).&lt;br /&gt;
 PORT    STATE SERVICE&lt;br /&gt;
 445/tcp open  microsoft-ds&lt;br /&gt;
 MAC Address: 36:66:33:66:32:39 (Unknown)&lt;br /&gt;
 &lt;br /&gt;
 Host script results:&lt;br /&gt;
 | smb-enum-users: &lt;br /&gt;
 |   WIKI\onno (RID: 1000)&lt;br /&gt;
 |     Full name:   onno&lt;br /&gt;
 |     Description: &lt;br /&gt;
 |     Flags:       Normal user account&lt;br /&gt;
 |   WIKI\tamu (RID: 1001)&lt;br /&gt;
 |     Full name:   &lt;br /&gt;
 |     Description: &lt;br /&gt;
 |     Flags:       Normal user account&lt;br /&gt;
 |   WIKI\tamu1 (RID: 1002)&lt;br /&gt;
 |     Full name:   &lt;br /&gt;
 |     Description: &lt;br /&gt;
 |     Flags:       Normal user account&lt;br /&gt;
 |   WIKI\tamu2 (RID: 1003)&lt;br /&gt;
 |     Full name:   &lt;br /&gt;
 |     Description: &lt;br /&gt;
 |_    Flags:       Normal user account &lt;br /&gt;
 &lt;br /&gt;
 Nmap done: 1 IP address (1 host up) scanned in 14.61 seconds&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://nmap.org/nsedoc/scripts/smb-enum-users.html&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>